Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 02:56
Behavioral task
behavioral1
Sample
1b5f82b7a79ee91f859e5408d4117d90_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
1b5f82b7a79ee91f859e5408d4117d90_NeikiAnalytics.exe
-
Size
448KB
-
MD5
1b5f82b7a79ee91f859e5408d4117d90
-
SHA1
f19f56bbf935b3e46ba5b99d0de0be393d148338
-
SHA256
e40bf60a9520e2940a3e6693206cd4c7ddb5649480b16dc7e1ff681dc7e9c8c1
-
SHA512
a3bfadf077447335d7c200d8bafc8373e7bb19110fdeb83836b22a37478edf2c199183eb7282b2abb99190280c7cde231fd291d67c0a98540f254b31cc2055a8
-
SSDEEP
6144:h1L2RGQdO798szclBqckEjiPISUOgW9X+hOGzC/NM:h1fQd3vr1kmZzcukG2/
Malware Config
Signatures
-
Malware Dropper & Backdoor - Berbew 19 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\Windows\SysWOW64\DWEKYSG.exe family_berbew C:\Windows\SysWOW64\OPHVYZ.exe family_berbew C:\Windows\System\XIYJP.exe family_berbew C:\Windows\SysWOW64\YLBN.exe family_berbew C:\Windows\JDRYDGV.exe family_berbew C:\Windows\System\OEB.exe family_berbew C:\Windows\BBNEAH.exe family_berbew C:\Windows\BKBBNY.exe family_berbew C:\Windows\System\UXN.exe family_berbew C:\windows\SysWOW64\WVS.exe family_berbew C:\Windows\System\MIRTUM.exe family_berbew C:\Windows\SysWOW64\UOWZFK.exe family_berbew C:\Windows\System\DRRPSBD.exe family_berbew C:\windows\system\TFIWM.exe family_berbew C:\Windows\SysWOW64\XIG.exe family_berbew C:\windows\system\ZGTDBM.exe family_berbew C:\Windows\System\RDLQ.exe family_berbew C:\Windows\ZRYW.exe family_berbew C:\Windows\SysWOW64\UEDGEN.exe family_berbew -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1b5f82b7a79ee91f859e5408d4117d90_NeikiAnalytics.exeUXN.exeZEQMW.exeSGP.exeDLGIKFB.exeATA.exeZSMEHXF.exeZSNAAG.exeZUWLFAD.exeDAMGCC.exeYLBN.exeICQJ.exeSUBF.exeLMLZW.exeHTBFT.exeGHEPJ.exePXHH.exeZAOFS.exeXQO.exeBBNEAH.exeTFIWM.exeUEDGEN.exeKZWE.exeKZI.exeIMWYSFG.exeFBV.exeXIYJP.exeUOWZFK.exeLJOHV.exeQBNRBUD.exeQTO.exeSSWI.exeJKMRBA.exeEQB.exeZAFUQBP.exeVJVKOGO.exeGZUHOMR.exeOPHVYZ.exeDRRPSBD.exeGJZMVNL.exePLWHLX.exeSSA.exePKCAL.exeIVWWY.exeSYMTRY.exeAHC.exeLOFT.exeSRYB.exeGKPJ.exeNAH.exeNQCSP.exeCRGZXFG.exePTTF.exeYECC.exeLXPXLM.exeJRD.exeCGIDFB.exeTBXB.exeUQB.exeMLSD.exeULT.exeZGTDBM.exeIOA.exeCGD.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 1b5f82b7a79ee91f859e5408d4117d90_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation UXN.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ZEQMW.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation SGP.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation DLGIKFB.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ATA.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ZSMEHXF.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ZSNAAG.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ZUWLFAD.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation DAMGCC.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation YLBN.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ICQJ.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation SUBF.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation LMLZW.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation HTBFT.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation GHEPJ.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation PXHH.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ZAOFS.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation XQO.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation BBNEAH.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation TFIWM.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation UEDGEN.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation KZWE.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation KZI.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation IMWYSFG.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation FBV.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation XIYJP.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation UOWZFK.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation LJOHV.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation QBNRBUD.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation QTO.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation SSWI.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation JKMRBA.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation EQB.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ZAFUQBP.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation VJVKOGO.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation GZUHOMR.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation OPHVYZ.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation DRRPSBD.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation GJZMVNL.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation PLWHLX.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation SSA.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation PKCAL.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation IVWWY.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation SYMTRY.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation AHC.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation LOFT.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation SRYB.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation GKPJ.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation NAH.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation NQCSP.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation CRGZXFG.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation PTTF.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation YECC.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation LXPXLM.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation JRD.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation CGIDFB.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation TBXB.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation UQB.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation MLSD.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ULT.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ZGTDBM.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation IOA.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation CGD.exe -
Executes dropped EXE 64 IoCs
Processes:
DWEKYSG.exeOPHVYZ.exeXIYJP.exeYLBN.exeJDRYDGV.exeOEB.exeBBNEAH.exeBKBBNY.exeUXN.exeWVS.exeMIRTUM.exeUOWZFK.exeAJIALH.exeDRRPSBD.exeTFIWM.exeXIG.exeZGTDBM.exeRDLQ.exeZRYW.exeUEDGEN.exeBUEF.exeJAI.exeDSYXFAW.exeATA.exeLJOHV.exeICQJ.exeKZWE.exeSNI.exeXFSNDDP.exeMLQK.exeUYDQ.exeCTTM.exeGJZMVNL.exeWZAMC.exeSAKO.exeNNPXQE.exeEOVDDV.exeSYMTRY.exeLMLZW.exeAHC.exeZAFUQBP.exeWSHWCF.exePLWHLX.exeIOA.exeQBNRBUD.exeAZSMICL.exeYKVURI.exeGPIIC.exeZSMEHXF.exeCGD.exeLOFT.exeKZI.exeOHOJZU.exeHHEUIN.exeHNEIKA.exeRLKCZI.exeNQCSP.exeHEBQV.exeCRGZXFG.exeVJVKOGO.exeUUYA.exeKNB.exePTTF.exeCQTRYGC.exepid process 2272 DWEKYSG.exe 3016 OPHVYZ.exe 1276 XIYJP.exe 464 YLBN.exe 1404 JDRYDGV.exe 2260 OEB.exe 1032 BBNEAH.exe 1400 BKBBNY.exe 4480 UXN.exe 1736 WVS.exe 4408 MIRTUM.exe 4856 UOWZFK.exe 1148 AJIALH.exe 4612 DRRPSBD.exe 4620 TFIWM.exe 4988 XIG.exe 4068 ZGTDBM.exe 1660 RDLQ.exe 3412 ZRYW.exe 964 UEDGEN.exe 1288 BUEF.exe 4292 JAI.exe 2260 DSYXFAW.exe 4452 ATA.exe 1756 LJOHV.exe 2256 ICQJ.exe 5036 KZWE.exe 4868 SNI.exe 1556 XFSNDDP.exe 4836 MLQK.exe 4408 UYDQ.exe 1752 CTTM.exe 4928 GJZMVNL.exe 2868 WZAMC.exe 3724 SAKO.exe 4620 NNPXQE.exe 1704 EOVDDV.exe 1084 SYMTRY.exe 3264 LMLZW.exe 4260 AHC.exe 4448 ZAFUQBP.exe 224 WSHWCF.exe 4564 PLWHLX.exe 4068 IOA.exe 2636 QBNRBUD.exe 1252 AZSMICL.exe 60 YKVURI.exe 992 GPIIC.exe 4944 ZSMEHXF.exe 1540 CGD.exe 3452 LOFT.exe 3824 KZI.exe 2252 OHOJZU.exe 4964 HHEUIN.exe 2136 HNEIKA.exe 560 RLKCZI.exe 2188 NQCSP.exe 1688 HEBQV.exe 752 CRGZXFG.exe 4056 VJVKOGO.exe 1124 UUYA.exe 4052 KNB.exe 5092 PTTF.exe 992 CQTRYGC.exe -
Drops file in System32 directory 64 IoCs
Processes:
SAKO.exeZUWLFAD.exeGKPJ.exeFPO.exeTBXB.exeSGP.exeDWEKYSG.exeUOWZFK.exeBUEF.exeATA.exeRVBCHA.exeZFDUJM.exe1b5f82b7a79ee91f859e5408d4117d90_NeikiAnalytics.exeZRYW.exeNQCSP.exeHEBQV.exeYVXDEDE.exeUYDQ.exeFER.exeZFWYI.exeDSDU.exeCGIDFB.exeWSHWCF.exeXUC.exeZFYN.exeZAOFS.exeKZWE.exeSOEOVWM.exeUEDGEN.exeZSMEHXF.exeQOD.exeFTVNF.exeJMMHOP.exeTFIWM.exeBRTTN.exeQTO.exeCQTRYGC.exeICQJ.exeISDT.exeEOVDDV.exeQKS.exeULT.exePEVE.exeOMV.exedescription ioc process File opened for modification C:\windows\SysWOW64\NNPXQE.exe SAKO.exe File created C:\windows\SysWOW64\YNHBOG.exe.bat ZUWLFAD.exe File opened for modification C:\windows\SysWOW64\QIUDVI.exe GKPJ.exe File created C:\windows\SysWOW64\NCB.exe FPO.exe File opened for modification C:\windows\SysWOW64\TUGD.exe TBXB.exe File created C:\windows\SysWOW64\IVWWY.exe SGP.exe File created C:\windows\SysWOW64\OPHVYZ.exe.bat DWEKYSG.exe File created C:\windows\SysWOW64\AJIALH.exe.bat UOWZFK.exe File created C:\windows\SysWOW64\JAI.exe.bat BUEF.exe File created C:\windows\SysWOW64\LJOHV.exe ATA.exe File created C:\windows\SysWOW64\VDHC.exe RVBCHA.exe File created C:\windows\SysWOW64\ZAOFS.exe ZFDUJM.exe File created C:\windows\SysWOW64\DWEKYSG.exe.bat 1b5f82b7a79ee91f859e5408d4117d90_NeikiAnalytics.exe File created C:\windows\SysWOW64\UEDGEN.exe.bat ZRYW.exe File opened for modification C:\windows\SysWOW64\HEBQV.exe NQCSP.exe File created C:\windows\SysWOW64\CRGZXFG.exe.bat HEBQV.exe File created C:\windows\SysWOW64\SOEOVWM.exe YVXDEDE.exe File created C:\windows\SysWOW64\LJOHV.exe.bat ATA.exe File created C:\windows\SysWOW64\CTTM.exe.bat UYDQ.exe File created C:\windows\SysWOW64\GZUHOMR.exe.bat FER.exe File created C:\windows\SysWOW64\HTBFT.exe.bat ZFWYI.exe File opened for modification C:\windows\SysWOW64\YNHBOG.exe ZUWLFAD.exe File opened for modification C:\windows\SysWOW64\RQLFL.exe DSDU.exe File created C:\windows\SysWOW64\BRTTN.exe CGIDFB.exe File created C:\windows\SysWOW64\TUGD.exe.bat TBXB.exe File created C:\windows\SysWOW64\PLWHLX.exe.bat WSHWCF.exe File created C:\windows\SysWOW64\INKTUN.exe.bat XUC.exe File created C:\windows\SysWOW64\ISDT.exe ZFYN.exe File created C:\windows\SysWOW64\MLSD.exe ZAOFS.exe File opened for modification C:\windows\SysWOW64\SNI.exe KZWE.exe File created C:\windows\SysWOW64\QJE.exe.bat SOEOVWM.exe File opened for modification C:\windows\SysWOW64\BUEF.exe UEDGEN.exe File created C:\windows\SysWOW64\CGD.exe ZSMEHXF.exe File created C:\windows\SysWOW64\FER.exe QOD.exe File created C:\windows\SysWOW64\QJE.exe SOEOVWM.exe File opened for modification C:\windows\SysWOW64\EDGD.exe FTVNF.exe File opened for modification C:\windows\SysWOW64\VPX.exe JMMHOP.exe File opened for modification C:\windows\SysWOW64\XIG.exe TFIWM.exe File opened for modification C:\windows\SysWOW64\UEDGEN.exe ZRYW.exe File created C:\windows\SysWOW64\RQLFL.exe.bat DSDU.exe File opened for modification C:\windows\SysWOW64\NCB.exe FPO.exe File created C:\windows\SysWOW64\ISDT.exe.bat ZFYN.exe File created C:\windows\SysWOW64\MJAEX.exe.bat BRTTN.exe File created C:\windows\SysWOW64\TBXB.exe.bat QTO.exe File opened for modification C:\windows\SysWOW64\DTXN.exe CQTRYGC.exe File created C:\windows\SysWOW64\QIUDVI.exe.bat GKPJ.exe File opened for modification C:\windows\SysWOW64\KZWE.exe ICQJ.exe File opened for modification C:\windows\SysWOW64\AJIALH.exe UOWZFK.exe File created C:\windows\SysWOW64\KZWE.exe ICQJ.exe File created C:\windows\SysWOW64\CGIDFB.exe ISDT.exe File created C:\windows\SysWOW64\EDGD.exe FTVNF.exe File opened for modification C:\windows\SysWOW64\SYMTRY.exe EOVDDV.exe File created C:\windows\SysWOW64\DNA.exe.bat QKS.exe File created C:\windows\SysWOW64\DTXN.exe.bat CQTRYGC.exe File created C:\windows\SysWOW64\FER.exe.bat QOD.exe File created C:\windows\SysWOW64\HTBFT.exe ZFWYI.exe File created C:\windows\SysWOW64\VOJW.exe ULT.exe File created C:\windows\SysWOW64\OMV.exe PEVE.exe File opened for modification C:\windows\SysWOW64\ZFYN.exe OMV.exe File created C:\windows\SysWOW64\XIG.exe.bat TFIWM.exe File created C:\windows\SysWOW64\NNPXQE.exe SAKO.exe File created C:\windows\SysWOW64\TUGD.exe TBXB.exe File created C:\windows\SysWOW64\VPX.exe.bat JMMHOP.exe File created C:\windows\SysWOW64\DTXN.exe CQTRYGC.exe -
Drops file in Windows directory 64 IoCs
Processes:
IOA.exeYKVURI.exePXHH.exeIVWWY.exeMMX.exePLWHLX.exeBGU.exeFDISVCO.exeNZBN.exeLMLZW.exeDTXN.exeUXNKH.exeSUBF.exeIPAU.exeWIHYD.exeAHC.exeVJVKOGO.exeBLD.exeVDHC.exeSSA.exeTUGD.exeDRRPSBD.exeZGTDBM.exeJAI.exeGJZMVNL.exeHHEUIN.exeCRGZXFG.exeDLGIKFB.exeGRYZ.exeNCB.exeNAFPVWQ.exeXBNDZ.exeXFSNDDP.exeCGD.exeRQLFL.exeFBV.exePKCAL.exeDAMGCC.exeYBQOYR.exeLJOHV.exeWZAMC.exePTTF.exeUGVLZ.exeDNA.exeWHXIW.exeILMDAGO.exeOPHVYZ.exeSYMTRY.exeLOFT.exeZSNAAG.exeMJAEX.exedescription ioc process File created C:\windows\QBNRBUD.exe.bat IOA.exe File created C:\windows\GPIIC.exe.bat YKVURI.exe File opened for modification C:\windows\JKMRBA.exe PXHH.exe File created C:\windows\system\JTDFAC.exe.bat IVWWY.exe File opened for modification C:\windows\VNZRRD.exe MMX.exe File created C:\windows\IOA.exe PLWHLX.exe File created C:\windows\YHW.exe.bat BGU.exe File created C:\windows\system\YVXDEDE.exe FDISVCO.exe File created C:\windows\system\PXHH.exe.bat NZBN.exe File opened for modification C:\windows\AHC.exe LMLZW.exe File opened for modification C:\windows\system\QWNL.exe DTXN.exe File opened for modification C:\windows\system\LXPXLM.exe UXNKH.exe File created C:\windows\system\LXFBJU.exe SUBF.exe File opened for modification C:\windows\BLD.exe IPAU.exe File created C:\windows\system\UTKG.exe.bat WIHYD.exe File created C:\windows\ZAFUQBP.exe.bat AHC.exe File created C:\windows\IOA.exe.bat PLWHLX.exe File created C:\windows\UUYA.exe VJVKOGO.exe File created C:\windows\BLD.exe IPAU.exe File created C:\windows\ULT.exe.bat BLD.exe File opened for modification C:\windows\system\FBV.exe VDHC.exe File created C:\windows\WIHYD.exe.bat SSA.exe File created C:\windows\BAKJ.exe TUGD.exe File opened for modification C:\windows\system\TFIWM.exe DRRPSBD.exe File created C:\windows\system\TFIWM.exe.bat DRRPSBD.exe File opened for modification C:\windows\system\RDLQ.exe ZGTDBM.exe File created C:\windows\system\DSYXFAW.exe.bat JAI.exe File created C:\windows\system\WZAMC.exe GJZMVNL.exe File created C:\windows\system\HNEIKA.exe.bat HHEUIN.exe File opened for modification C:\windows\VJVKOGO.exe CRGZXFG.exe File opened for modification C:\windows\system\UJFLWR.exe DLGIKFB.exe File opened for modification C:\windows\QOD.exe GRYZ.exe File opened for modification C:\windows\ZAHI.exe NCB.exe File created C:\windows\DQGOU.exe.bat NAFPVWQ.exe File created C:\windows\PKCAL.exe XBNDZ.exe File created C:\windows\WIHYD.exe SSA.exe File created C:\windows\system\MLQK.exe XFSNDDP.exe File created C:\windows\system\LOFT.exe CGD.exe File opened for modification C:\windows\YHW.exe BGU.exe File created C:\windows\system\LXFBJU.exe.bat SUBF.exe File created C:\windows\BLD.exe.bat IPAU.exe File opened for modification C:\windows\ZEQMW.exe RQLFL.exe File created C:\windows\system\NPA.exe FBV.exe File opened for modification C:\windows\BAKJ.exe TUGD.exe File created C:\windows\SSWI.exe.bat PKCAL.exe File opened for modification C:\windows\HIS.exe DAMGCC.exe File created C:\windows\RTGZHS.exe.bat YBQOYR.exe File opened for modification C:\windows\system\ICQJ.exe LJOHV.exe File created C:\windows\SAKO.exe.bat WZAMC.exe File created C:\windows\system\CQTRYGC.exe.bat PTTF.exe File created C:\windows\system\SRYB.exe.bat UGVLZ.exe File opened for modification C:\windows\ZSNAAG.exe DNA.exe File created C:\windows\system\YECC.exe.bat WHXIW.exe File opened for modification C:\windows\RTGZHS.exe YBQOYR.exe File created C:\windows\DQGOU.exe NAFPVWQ.exe File created C:\windows\BAKJ.exe.bat TUGD.exe File opened for modification C:\windows\PKCAL.exe XBNDZ.exe File created C:\windows\XBNDZ.exe ILMDAGO.exe File created C:\windows\system\XIYJP.exe.bat OPHVYZ.exe File created C:\windows\LMLZW.exe SYMTRY.exe File created C:\windows\system\KZI.exe LOFT.exe File opened for modification C:\windows\ULT.exe BLD.exe File opened for modification C:\windows\system\DBHI.exe ZSNAAG.exe File created C:\windows\UXNKH.exe MJAEX.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3856 3588 WerFault.exe 1b5f82b7a79ee91f859e5408d4117d90_NeikiAnalytics.exe 4836 2272 WerFault.exe DWEKYSG.exe 1708 3016 WerFault.exe OPHVYZ.exe 1540 1276 WerFault.exe XIYJP.exe 3832 464 WerFault.exe YLBN.exe 2096 1404 WerFault.exe JDRYDGV.exe 1096 2260 WerFault.exe OEB.exe 3748 1032 WerFault.exe BBNEAH.exe 928 1400 WerFault.exe BKBBNY.exe 4320 4480 WerFault.exe UXN.exe 1860 1736 WerFault.exe WVS.exe 4244 4408 WerFault.exe MIRTUM.exe 1752 4856 WerFault.exe UOWZFK.exe 3876 1148 WerFault.exe AJIALH.exe 3924 4612 WerFault.exe DRRPSBD.exe 4048 4620 WerFault.exe TFIWM.exe 1860 4988 WerFault.exe XIG.exe 4564 4068 WerFault.exe ZGTDBM.exe 2992 1660 WerFault.exe RDLQ.exe 1032 3412 WerFault.exe ZRYW.exe 4084 964 WerFault.exe UEDGEN.exe 4200 1288 WerFault.exe BUEF.exe 1420 4292 WerFault.exe JAI.exe 4988 2260 WerFault.exe DSYXFAW.exe 2024 4452 WerFault.exe ATA.exe 3036 1756 WerFault.exe LJOHV.exe 1032 2256 WerFault.exe ICQJ.exe 2964 5036 WerFault.exe KZWE.exe 4644 4868 WerFault.exe SNI.exe 1544 1556 WerFault.exe XFSNDDP.exe 4776 4836 WerFault.exe MLQK.exe 2028 4408 WerFault.exe UYDQ.exe 3468 1752 WerFault.exe CTTM.exe 3708 4928 WerFault.exe GJZMVNL.exe 4056 2868 WerFault.exe WZAMC.exe 4668 3724 WerFault.exe SAKO.exe 3952 4620 WerFault.exe NNPXQE.exe 776 1704 WerFault.exe EOVDDV.exe 3436 1084 WerFault.exe SYMTRY.exe 4624 3264 WerFault.exe LMLZW.exe 3744 4260 WerFault.exe AHC.exe 3556 4448 WerFault.exe ZAFUQBP.exe 764 224 WerFault.exe WSHWCF.exe 2888 4564 WerFault.exe PLWHLX.exe 4916 4068 WerFault.exe IOA.exe 3880 2636 WerFault.exe QBNRBUD.exe 3924 1252 WerFault.exe AZSMICL.exe 3412 60 WerFault.exe YKVURI.exe 1732 992 WerFault.exe GPIIC.exe 1812 4944 WerFault.exe ZSMEHXF.exe 4804 1540 WerFault.exe CGD.exe 3436 3452 WerFault.exe LOFT.exe 3196 3824 WerFault.exe KZI.exe 2692 2252 WerFault.exe OHOJZU.exe 2436 4964 WerFault.exe HHEUIN.exe 3444 2136 WerFault.exe HNEIKA.exe 3008 560 WerFault.exe RLKCZI.exe 1152 2188 WerFault.exe NQCSP.exe 4068 1688 WerFault.exe HEBQV.exe 1564 752 WerFault.exe CRGZXFG.exe 2884 4056 WerFault.exe VJVKOGO.exe 4032 1124 WerFault.exe UUYA.exe 5060 4052 WerFault.exe KNB.exe 1556 5092 WerFault.exe PTTF.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1b5f82b7a79ee91f859e5408d4117d90_NeikiAnalytics.exeDWEKYSG.exeOPHVYZ.exeXIYJP.exeYLBN.exeJDRYDGV.exeOEB.exeBBNEAH.exeBKBBNY.exeUXN.exeWVS.exeMIRTUM.exeUOWZFK.exeAJIALH.exeDRRPSBD.exeTFIWM.exeXIG.exeZGTDBM.exeRDLQ.exeZRYW.exeUEDGEN.exeBUEF.exeJAI.exeDSYXFAW.exeATA.exeLJOHV.exeICQJ.exeKZWE.exeSNI.exeXFSNDDP.exeMLQK.exeUYDQ.exepid process 3588 1b5f82b7a79ee91f859e5408d4117d90_NeikiAnalytics.exe 3588 1b5f82b7a79ee91f859e5408d4117d90_NeikiAnalytics.exe 2272 DWEKYSG.exe 2272 DWEKYSG.exe 3016 OPHVYZ.exe 3016 OPHVYZ.exe 1276 XIYJP.exe 1276 XIYJP.exe 464 YLBN.exe 464 YLBN.exe 1404 JDRYDGV.exe 1404 JDRYDGV.exe 2260 OEB.exe 2260 OEB.exe 1032 BBNEAH.exe 1032 BBNEAH.exe 1400 BKBBNY.exe 1400 BKBBNY.exe 4480 UXN.exe 4480 UXN.exe 1736 WVS.exe 1736 WVS.exe 4408 MIRTUM.exe 4408 MIRTUM.exe 4856 UOWZFK.exe 4856 UOWZFK.exe 1148 AJIALH.exe 1148 AJIALH.exe 4612 DRRPSBD.exe 4612 DRRPSBD.exe 4620 TFIWM.exe 4620 TFIWM.exe 4988 XIG.exe 4988 XIG.exe 4068 ZGTDBM.exe 4068 ZGTDBM.exe 1660 RDLQ.exe 1660 RDLQ.exe 3412 ZRYW.exe 3412 ZRYW.exe 964 UEDGEN.exe 964 UEDGEN.exe 1288 BUEF.exe 1288 BUEF.exe 4292 JAI.exe 4292 JAI.exe 2260 DSYXFAW.exe 2260 DSYXFAW.exe 4452 ATA.exe 4452 ATA.exe 1756 LJOHV.exe 1756 LJOHV.exe 2256 ICQJ.exe 2256 ICQJ.exe 5036 KZWE.exe 5036 KZWE.exe 4868 SNI.exe 4868 SNI.exe 1556 XFSNDDP.exe 1556 XFSNDDP.exe 4836 MLQK.exe 4836 MLQK.exe 4408 UYDQ.exe 4408 UYDQ.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
1b5f82b7a79ee91f859e5408d4117d90_NeikiAnalytics.exeDWEKYSG.exeOPHVYZ.exeXIYJP.exeYLBN.exeJDRYDGV.exeOEB.exeBBNEAH.exeBKBBNY.exeUXN.exeWVS.exeMIRTUM.exeUOWZFK.exeAJIALH.exeDRRPSBD.exeTFIWM.exeXIG.exeZGTDBM.exeRDLQ.exeZRYW.exeUEDGEN.exeBUEF.exeJAI.exeDSYXFAW.exeATA.exeLJOHV.exeICQJ.exeKZWE.exeSNI.exeXFSNDDP.exeMLQK.exeUYDQ.exepid process 3588 1b5f82b7a79ee91f859e5408d4117d90_NeikiAnalytics.exe 3588 1b5f82b7a79ee91f859e5408d4117d90_NeikiAnalytics.exe 2272 DWEKYSG.exe 2272 DWEKYSG.exe 3016 OPHVYZ.exe 3016 OPHVYZ.exe 1276 XIYJP.exe 1276 XIYJP.exe 464 YLBN.exe 464 YLBN.exe 1404 JDRYDGV.exe 1404 JDRYDGV.exe 2260 OEB.exe 2260 OEB.exe 1032 BBNEAH.exe 1032 BBNEAH.exe 1400 BKBBNY.exe 1400 BKBBNY.exe 4480 UXN.exe 4480 UXN.exe 1736 WVS.exe 1736 WVS.exe 4408 MIRTUM.exe 4408 MIRTUM.exe 4856 UOWZFK.exe 4856 UOWZFK.exe 1148 AJIALH.exe 1148 AJIALH.exe 4612 DRRPSBD.exe 4612 DRRPSBD.exe 4620 TFIWM.exe 4620 TFIWM.exe 4988 XIG.exe 4988 XIG.exe 4068 ZGTDBM.exe 4068 ZGTDBM.exe 1660 RDLQ.exe 1660 RDLQ.exe 3412 ZRYW.exe 3412 ZRYW.exe 964 UEDGEN.exe 964 UEDGEN.exe 1288 BUEF.exe 1288 BUEF.exe 4292 JAI.exe 4292 JAI.exe 2260 DSYXFAW.exe 2260 DSYXFAW.exe 4452 ATA.exe 4452 ATA.exe 1756 LJOHV.exe 1756 LJOHV.exe 2256 ICQJ.exe 2256 ICQJ.exe 5036 KZWE.exe 5036 KZWE.exe 4868 SNI.exe 4868 SNI.exe 1556 XFSNDDP.exe 1556 XFSNDDP.exe 4836 MLQK.exe 4836 MLQK.exe 4408 UYDQ.exe 4408 UYDQ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1b5f82b7a79ee91f859e5408d4117d90_NeikiAnalytics.execmd.exeDWEKYSG.execmd.exeOPHVYZ.execmd.exeXIYJP.execmd.exeYLBN.execmd.exeJDRYDGV.execmd.exeOEB.execmd.exeBBNEAH.execmd.exeBKBBNY.execmd.exeUXN.execmd.exeWVS.execmd.exedescription pid process target process PID 3588 wrote to memory of 4588 3588 1b5f82b7a79ee91f859e5408d4117d90_NeikiAnalytics.exe cmd.exe PID 3588 wrote to memory of 4588 3588 1b5f82b7a79ee91f859e5408d4117d90_NeikiAnalytics.exe cmd.exe PID 3588 wrote to memory of 4588 3588 1b5f82b7a79ee91f859e5408d4117d90_NeikiAnalytics.exe cmd.exe PID 4588 wrote to memory of 2272 4588 cmd.exe DWEKYSG.exe PID 4588 wrote to memory of 2272 4588 cmd.exe DWEKYSG.exe PID 4588 wrote to memory of 2272 4588 cmd.exe DWEKYSG.exe PID 2272 wrote to memory of 1596 2272 DWEKYSG.exe cmd.exe PID 2272 wrote to memory of 1596 2272 DWEKYSG.exe cmd.exe PID 2272 wrote to memory of 1596 2272 DWEKYSG.exe cmd.exe PID 1596 wrote to memory of 3016 1596 cmd.exe OPHVYZ.exe PID 1596 wrote to memory of 3016 1596 cmd.exe OPHVYZ.exe PID 1596 wrote to memory of 3016 1596 cmd.exe OPHVYZ.exe PID 3016 wrote to memory of 4340 3016 OPHVYZ.exe cmd.exe PID 3016 wrote to memory of 4340 3016 OPHVYZ.exe cmd.exe PID 3016 wrote to memory of 4340 3016 OPHVYZ.exe cmd.exe PID 4340 wrote to memory of 1276 4340 cmd.exe XIYJP.exe PID 4340 wrote to memory of 1276 4340 cmd.exe XIYJP.exe PID 4340 wrote to memory of 1276 4340 cmd.exe XIYJP.exe PID 1276 wrote to memory of 2060 1276 XIYJP.exe cmd.exe PID 1276 wrote to memory of 2060 1276 XIYJP.exe cmd.exe PID 1276 wrote to memory of 2060 1276 XIYJP.exe cmd.exe PID 2060 wrote to memory of 464 2060 cmd.exe YLBN.exe PID 2060 wrote to memory of 464 2060 cmd.exe YLBN.exe PID 2060 wrote to memory of 464 2060 cmd.exe YLBN.exe PID 464 wrote to memory of 984 464 YLBN.exe cmd.exe PID 464 wrote to memory of 984 464 YLBN.exe cmd.exe PID 464 wrote to memory of 984 464 YLBN.exe cmd.exe PID 984 wrote to memory of 1404 984 cmd.exe JDRYDGV.exe PID 984 wrote to memory of 1404 984 cmd.exe JDRYDGV.exe PID 984 wrote to memory of 1404 984 cmd.exe JDRYDGV.exe PID 1404 wrote to memory of 560 1404 JDRYDGV.exe cmd.exe PID 1404 wrote to memory of 560 1404 JDRYDGV.exe cmd.exe PID 1404 wrote to memory of 560 1404 JDRYDGV.exe cmd.exe PID 560 wrote to memory of 2260 560 cmd.exe OEB.exe PID 560 wrote to memory of 2260 560 cmd.exe OEB.exe PID 560 wrote to memory of 2260 560 cmd.exe OEB.exe PID 2260 wrote to memory of 1512 2260 OEB.exe cmd.exe PID 2260 wrote to memory of 1512 2260 OEB.exe cmd.exe PID 2260 wrote to memory of 1512 2260 OEB.exe cmd.exe PID 1512 wrote to memory of 1032 1512 cmd.exe BBNEAH.exe PID 1512 wrote to memory of 1032 1512 cmd.exe BBNEAH.exe PID 1512 wrote to memory of 1032 1512 cmd.exe BBNEAH.exe PID 1032 wrote to memory of 1504 1032 BBNEAH.exe cmd.exe PID 1032 wrote to memory of 1504 1032 BBNEAH.exe cmd.exe PID 1032 wrote to memory of 1504 1032 BBNEAH.exe cmd.exe PID 1504 wrote to memory of 1400 1504 cmd.exe BKBBNY.exe PID 1504 wrote to memory of 1400 1504 cmd.exe BKBBNY.exe PID 1504 wrote to memory of 1400 1504 cmd.exe BKBBNY.exe PID 1400 wrote to memory of 2852 1400 BKBBNY.exe cmd.exe PID 1400 wrote to memory of 2852 1400 BKBBNY.exe cmd.exe PID 1400 wrote to memory of 2852 1400 BKBBNY.exe cmd.exe PID 2852 wrote to memory of 4480 2852 cmd.exe UXN.exe PID 2852 wrote to memory of 4480 2852 cmd.exe UXN.exe PID 2852 wrote to memory of 4480 2852 cmd.exe UXN.exe PID 4480 wrote to memory of 2536 4480 UXN.exe cmd.exe PID 4480 wrote to memory of 2536 4480 UXN.exe cmd.exe PID 4480 wrote to memory of 2536 4480 UXN.exe cmd.exe PID 2536 wrote to memory of 1736 2536 cmd.exe WVS.exe PID 2536 wrote to memory of 1736 2536 cmd.exe WVS.exe PID 2536 wrote to memory of 1736 2536 cmd.exe WVS.exe PID 1736 wrote to memory of 4808 1736 WVS.exe cmd.exe PID 1736 wrote to memory of 4808 1736 WVS.exe cmd.exe PID 1736 wrote to memory of 4808 1736 WVS.exe cmd.exe PID 4808 wrote to memory of 4408 4808 cmd.exe MIRTUM.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b5f82b7a79ee91f859e5408d4117d90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1b5f82b7a79ee91f859e5408d4117d90_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\DWEKYSG.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\windows\SysWOW64\DWEKYSG.exeC:\windows\system32\DWEKYSG.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\OPHVYZ.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
-
C:\windows\SysWOW64\OPHVYZ.exeC:\windows\system32\OPHVYZ.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XIYJP.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
-
C:\windows\system\XIYJP.exeC:\windows\system\XIYJP.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YLBN.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
-
C:\windows\SysWOW64\YLBN.exeC:\windows\system32\YLBN.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JDRYDGV.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
-
C:\windows\JDRYDGV.exeC:\windows\JDRYDGV.exe11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\OEB.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
-
C:\windows\system\OEB.exeC:\windows\system\OEB.exe13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BBNEAH.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
-
C:\windows\BBNEAH.exeC:\windows\BBNEAH.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BKBBNY.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
-
C:\windows\BKBBNY.exeC:\windows\BKBBNY.exe17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\UXN.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
-
C:\windows\system\UXN.exeC:\windows\system\UXN.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\WVS.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
-
C:\windows\SysWOW64\WVS.exeC:\windows\system32\WVS.exe21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MIRTUM.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
-
C:\windows\system\MIRTUM.exeC:\windows\system\MIRTUM.exe23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UOWZFK.exe.bat" "24⤵
-
C:\windows\SysWOW64\UOWZFK.exeC:\windows\system32\UOWZFK.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\AJIALH.exe.bat" "26⤵
-
C:\windows\SysWOW64\AJIALH.exeC:\windows\system32\AJIALH.exe27⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DRRPSBD.exe.bat" "28⤵
-
C:\windows\system\DRRPSBD.exeC:\windows\system\DRRPSBD.exe29⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\TFIWM.exe.bat" "30⤵
-
C:\windows\system\TFIWM.exeC:\windows\system\TFIWM.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\XIG.exe.bat" "32⤵
-
C:\windows\SysWOW64\XIG.exeC:\windows\system32\XIG.exe33⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZGTDBM.exe.bat" "34⤵
-
C:\windows\system\ZGTDBM.exeC:\windows\system\ZGTDBM.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\RDLQ.exe.bat" "36⤵
-
C:\windows\system\RDLQ.exeC:\windows\system\RDLQ.exe37⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZRYW.exe.bat" "38⤵
-
C:\windows\ZRYW.exeC:\windows\ZRYW.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UEDGEN.exe.bat" "40⤵
-
C:\windows\SysWOW64\UEDGEN.exeC:\windows\system32\UEDGEN.exe41⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BUEF.exe.bat" "42⤵
-
C:\windows\SysWOW64\BUEF.exeC:\windows\system32\BUEF.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JAI.exe.bat" "44⤵
-
C:\windows\SysWOW64\JAI.exeC:\windows\system32\JAI.exe45⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DSYXFAW.exe.bat" "46⤵
-
C:\windows\system\DSYXFAW.exeC:\windows\system\DSYXFAW.exe47⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ATA.exe.bat" "48⤵
-
C:\windows\system\ATA.exeC:\windows\system\ATA.exe49⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\LJOHV.exe.bat" "50⤵
-
C:\windows\SysWOW64\LJOHV.exeC:\windows\system32\LJOHV.exe51⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ICQJ.exe.bat" "52⤵
-
C:\windows\system\ICQJ.exeC:\windows\system\ICQJ.exe53⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KZWE.exe.bat" "54⤵
-
C:\windows\SysWOW64\KZWE.exeC:\windows\system32\KZWE.exe55⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\SNI.exe.bat" "56⤵
-
C:\windows\SysWOW64\SNI.exeC:\windows\system32\SNI.exe57⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\XFSNDDP.exe.bat" "58⤵
-
C:\windows\XFSNDDP.exeC:\windows\XFSNDDP.exe59⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MLQK.exe.bat" "60⤵
-
C:\windows\system\MLQK.exeC:\windows\system\MLQK.exe61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\UYDQ.exe.bat" "62⤵
-
C:\windows\system\UYDQ.exeC:\windows\system\UYDQ.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CTTM.exe.bat" "64⤵
-
C:\windows\SysWOW64\CTTM.exeC:\windows\system32\CTTM.exe65⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\GJZMVNL.exe.bat" "66⤵
-
C:\windows\system\GJZMVNL.exeC:\windows\system\GJZMVNL.exe67⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WZAMC.exe.bat" "68⤵
-
C:\windows\system\WZAMC.exeC:\windows\system\WZAMC.exe69⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SAKO.exe.bat" "70⤵
-
C:\windows\SAKO.exeC:\windows\SAKO.exe71⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\NNPXQE.exe.bat" "72⤵
-
C:\windows\SysWOW64\NNPXQE.exeC:\windows\system32\NNPXQE.exe73⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\EOVDDV.exe.bat" "74⤵
-
C:\windows\system\EOVDDV.exeC:\windows\system\EOVDDV.exe75⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\SYMTRY.exe.bat" "76⤵
-
C:\windows\SysWOW64\SYMTRY.exeC:\windows\system32\SYMTRY.exe77⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\LMLZW.exe.bat" "78⤵
-
C:\windows\LMLZW.exeC:\windows\LMLZW.exe79⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\AHC.exe.bat" "80⤵
-
C:\windows\AHC.exeC:\windows\AHC.exe81⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZAFUQBP.exe.bat" "82⤵
-
C:\windows\ZAFUQBP.exeC:\windows\ZAFUQBP.exe83⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\WSHWCF.exe.bat" "84⤵
-
C:\windows\SysWOW64\WSHWCF.exeC:\windows\system32\WSHWCF.exe85⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\PLWHLX.exe.bat" "86⤵
-
C:\windows\SysWOW64\PLWHLX.exeC:\windows\system32\PLWHLX.exe87⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\IOA.exe.bat" "88⤵
-
C:\windows\IOA.exeC:\windows\IOA.exe89⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QBNRBUD.exe.bat" "90⤵
-
C:\windows\QBNRBUD.exeC:\windows\QBNRBUD.exe91⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\AZSMICL.exe.bat" "92⤵
-
C:\windows\system\AZSMICL.exeC:\windows\system\AZSMICL.exe93⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YKVURI.exe.bat" "94⤵
-
C:\windows\SysWOW64\YKVURI.exeC:\windows\system32\YKVURI.exe95⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\GPIIC.exe.bat" "96⤵
-
C:\windows\GPIIC.exeC:\windows\GPIIC.exe97⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZSMEHXF.exe.bat" "98⤵
-
C:\windows\system\ZSMEHXF.exeC:\windows\system\ZSMEHXF.exe99⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CGD.exe.bat" "100⤵
-
C:\windows\SysWOW64\CGD.exeC:\windows\system32\CGD.exe101⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\LOFT.exe.bat" "102⤵
-
C:\windows\system\LOFT.exeC:\windows\system\LOFT.exe103⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\KZI.exe.bat" "104⤵
-
C:\windows\system\KZI.exeC:\windows\system\KZI.exe105⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\OHOJZU.exe.bat" "106⤵
-
C:\windows\system\OHOJZU.exeC:\windows\system\OHOJZU.exe107⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HHEUIN.exe.bat" "108⤵
-
C:\windows\system\HHEUIN.exeC:\windows\system\HHEUIN.exe109⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HNEIKA.exe.bat" "110⤵
-
C:\windows\system\HNEIKA.exeC:\windows\system\HNEIKA.exe111⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\RLKCZI.exe.bat" "112⤵
-
C:\windows\system\RLKCZI.exeC:\windows\system\RLKCZI.exe113⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\NQCSP.exe.bat" "114⤵
-
C:\windows\NQCSP.exeC:\windows\NQCSP.exe115⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HEBQV.exe.bat" "116⤵
-
C:\windows\SysWOW64\HEBQV.exeC:\windows\system32\HEBQV.exe117⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CRGZXFG.exe.bat" "118⤵
-
C:\windows\SysWOW64\CRGZXFG.exeC:\windows\system32\CRGZXFG.exe119⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VJVKOGO.exe.bat" "120⤵
-
C:\windows\VJVKOGO.exeC:\windows\VJVKOGO.exe121⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\UUYA.exe.bat" "122⤵
-
C:\windows\UUYA.exeC:\windows\UUYA.exe123⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\KNB.exe.bat" "124⤵
-
C:\windows\KNB.exeC:\windows\KNB.exe125⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PTTF.exe.bat" "126⤵
-
C:\windows\system\PTTF.exeC:\windows\system\PTTF.exe127⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CQTRYGC.exe.bat" "128⤵
-
C:\windows\system\CQTRYGC.exeC:\windows\system\CQTRYGC.exe129⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\DTXN.exe.bat" "130⤵
-
C:\windows\SysWOW64\DTXN.exeC:\windows\system32\DTXN.exe131⤵
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QWNL.exe.bat" "132⤵
-
C:\windows\system\QWNL.exeC:\windows\system\QWNL.exe133⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WRZE.exe.bat" "134⤵
-
C:\windows\WRZE.exeC:\windows\WRZE.exe135⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\XUC.exe.bat" "136⤵
-
C:\windows\XUC.exeC:\windows\XUC.exe137⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\INKTUN.exe.bat" "138⤵
-
C:\windows\SysWOW64\INKTUN.exeC:\windows\system32\INKTUN.exe139⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YDLS.exe.bat" "140⤵
-
C:\windows\SysWOW64\YDLS.exeC:\windows\system32\YDLS.exe141⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\GRYZ.exe.bat" "142⤵
-
C:\windows\GRYZ.exeC:\windows\GRYZ.exe143⤵
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QOD.exe.bat" "144⤵
-
C:\windows\QOD.exeC:\windows\QOD.exe145⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FER.exe.bat" "146⤵
-
C:\windows\SysWOW64\FER.exeC:\windows\system32\FER.exe147⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GZUHOMR.exe.bat" "148⤵
-
C:\windows\SysWOW64\GZUHOMR.exeC:\windows\system32\GZUHOMR.exe149⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MVGAUAZ.exe.bat" "150⤵
-
C:\windows\system\MVGAUAZ.exeC:\windows\system\MVGAUAZ.exe151⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZFWYI.exe.bat" "152⤵
-
C:\windows\system\ZFWYI.exeC:\windows\system\ZFWYI.exe153⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HTBFT.exe.bat" "154⤵
-
C:\windows\SysWOW64\HTBFT.exeC:\windows\system32\HTBFT.exe155⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\IOF.exe.bat" "156⤵
-
C:\windows\system\IOF.exeC:\windows\system\IOF.exe157⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\BGU.exe.bat" "158⤵
-
C:\windows\system\BGU.exeC:\windows\system\BGU.exe159⤵
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\YHW.exe.bat" "160⤵
-
C:\windows\YHW.exeC:\windows\YHW.exe161⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\SUBF.exe.bat" "162⤵
-
C:\windows\SysWOW64\SUBF.exeC:\windows\system32\SUBF.exe163⤵
- Checks computer location settings
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\LXFBJU.exe.bat" "164⤵
-
C:\windows\system\LXFBJU.exeC:\windows\system\LXFBJU.exe165⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\EQUUSV.exe.bat" "166⤵
-
C:\windows\system\EQUUSV.exeC:\windows\system\EQUUSV.exe167⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UGVLZ.exe.bat" "168⤵
-
C:\windows\SysWOW64\UGVLZ.exeC:\windows\system32\UGVLZ.exe169⤵
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\SRYB.exe.bat" "170⤵
-
C:\windows\system\SRYB.exeC:\windows\system\SRYB.exe171⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\GBOAWZV.exe.bat" "172⤵
-
C:\windows\GBOAWZV.exeC:\windows\GBOAWZV.exe173⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZUWLFAD.exe.bat" "174⤵
-
C:\windows\system\ZUWLFAD.exeC:\windows\system\ZUWLFAD.exe175⤵
- Checks computer location settings
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YNHBOG.exe.bat" "176⤵
-
C:\windows\SysWOW64\YNHBOG.exeC:\windows\system32\YNHBOG.exe177⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FDISVCO.exe.bat" "178⤵
-
C:\windows\SysWOW64\FDISVCO.exeC:\windows\system32\FDISVCO.exe179⤵
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YVXDEDE.exe.bat" "180⤵
-
C:\windows\system\YVXDEDE.exeC:\windows\system\YVXDEDE.exe181⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\SOEOVWM.exe.bat" "182⤵
-
C:\windows\SysWOW64\SOEOVWM.exeC:\windows\system32\SOEOVWM.exe183⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\QJE.exe.bat" "184⤵
-
C:\windows\SysWOW64\QJE.exeC:\windows\system32\QJE.exe185⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\AHJ.exe.bat" "186⤵
-
C:\windows\AHJ.exeC:\windows\AHJ.exe187⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\IMWYSFG.exe.bat" "188⤵
-
C:\windows\system\IMWYSFG.exeC:\windows\system\IMWYSFG.exe189⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\IPAU.exe.bat" "190⤵
-
C:\windows\SysWOW64\IPAU.exeC:\windows\system32\IPAU.exe191⤵
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BLD.exe.bat" "192⤵
-
C:\windows\BLD.exeC:\windows\BLD.exe193⤵
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ULT.exe.bat" "194⤵
-
C:\windows\ULT.exeC:\windows\ULT.exe195⤵
- Checks computer location settings
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\VOJW.exe.bat" "196⤵
-
C:\windows\SysWOW64\VOJW.exeC:\windows\system32\VOJW.exe197⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\GHEPJ.exe.bat" "198⤵
-
C:\windows\GHEPJ.exeC:\windows\GHEPJ.exe199⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WXNOQY.exe.bat" "200⤵
-
C:\windows\system\WXNOQY.exeC:\windows\system\WXNOQY.exe201⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QKS.exe.bat" "202⤵
-
C:\windows\QKS.exeC:\windows\QKS.exe203⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\DNA.exe.bat" "204⤵
-
C:\windows\SysWOW64\DNA.exeC:\windows\system32\DNA.exe205⤵
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZSNAAG.exe.bat" "206⤵
-
C:\windows\ZSNAAG.exeC:\windows\ZSNAAG.exe207⤵
- Checks computer location settings
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DBHI.exe.bat" "208⤵
-
C:\windows\system\DBHI.exeC:\windows\system\DBHI.exe209⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\TTS.exe.bat" "210⤵
-
C:\windows\system\TTS.exeC:\windows\system\TTS.exe211⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WHXIW.exe.bat" "212⤵
-
C:\windows\system\WHXIW.exeC:\windows\system\WHXIW.exe213⤵
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YECC.exe.bat" "214⤵
-
C:\windows\system\YECC.exeC:\windows\system\YECC.exe215⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\GKPJ.exe.bat" "216⤵
-
C:\windows\system\GKPJ.exeC:\windows\system\GKPJ.exe217⤵
- Checks computer location settings
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\QIUDVI.exe.bat" "218⤵
-
C:\windows\SysWOW64\QIUDVI.exeC:\windows\system32\QIUDVI.exe219⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DSDU.exe.bat" "220⤵
-
C:\windows\system\DSDU.exeC:\windows\system\DSDU.exe221⤵
- Drops file in System32 directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\RQLFL.exe.bat" "222⤵
-
C:\windows\SysWOW64\RQLFL.exeC:\windows\system32\RQLFL.exe223⤵
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZEQMW.exe.bat" "224⤵
-
C:\windows\ZEQMW.exeC:\windows\ZEQMW.exe225⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\NZBN.exe.bat" "226⤵
-
C:\windows\NZBN.exeC:\windows\NZBN.exe227⤵
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PXHH.exe.bat" "228⤵
-
C:\windows\system\PXHH.exeC:\windows\system\PXHH.exe229⤵
- Checks computer location settings
- Drops file in Windows directory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JKMRBA.exe.bat" "230⤵
-
C:\windows\JKMRBA.exeC:\windows\JKMRBA.exe231⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\YFXKH.exe.bat" "232⤵
-
C:\windows\YFXKH.exeC:\windows\YFXKH.exe233⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\NAH.exe.bat" "234⤵
-
C:\windows\NAH.exeC:\windows\NAH.exe235⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PYU.exe.bat" "236⤵
-
C:\windows\system\PYU.exeC:\windows\system\PYU.exe237⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\CWUUJV.exe.bat" "238⤵
-
C:\windows\CWUUJV.exeC:\windows\CWUUJV.exe239⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\IWCISX.exe.bat" "240⤵
-
C:\windows\IWCISX.exeC:\windows\IWCISX.exe241⤵